Amazon cover image
Image from Amazon.com

Designing and building enterprise DMZs / technical editor, Ido Dubrawsky ; authors, C. Tate Baumrucker [and others].

Contributor(s): Material type: TextTextPublication details: Rockland, MA : Syngress, ©2006.Description: 1 online resource (xxii, 714 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1429415916
  • 9781429415910
  • 9781597491006
  • 1597491004
  • 0080504000
  • 9780080504001
Other title:
  • Designing and building enterprise demilitarized zones
Subject(s): Additional physical formats: Print version:: Designing and building enterprise DMZs.DDC classification:
  • 005.8 22
LOC classification:
  • TK5105.59 .D47 2006eb
Online resources:
Contents:
1: DMZ Concepts, Layout and Conceptual Design -- 2: Windows 2000 DMZ Design -- 3: Solaris DMZ Design -- 4: Wireless DMZs (WDMZs) -- 5: Firewall Design: Cisco PIX -- 6: Firewall and DMZ Design: Checkpoint NG -- 7: Firewall and DMZ Design: Nokia Firewall -- 8: Firewall and DMZ Design: ISA Server 2000 -- 9: DMZ Router and Switch Security -- 10: DMZ Based VPN Services -- 11: Wireless DMZ Implementation -- 12: Sun Solaris Bastion Hosts -- 13: Windows 2000 Bastion Hosts -- 14: Hacking the DMZ -- 15: Intrusion Detection in the DMZ.
Summary: This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. The only book published on Network DMZs on the components of securing enterprise networks This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Includes index.

Print version record.

1: DMZ Concepts, Layout and Conceptual Design -- 2: Windows 2000 DMZ Design -- 3: Solaris DMZ Design -- 4: Wireless DMZs (WDMZs) -- 5: Firewall Design: Cisco PIX -- 6: Firewall and DMZ Design: Checkpoint NG -- 7: Firewall and DMZ Design: Nokia Firewall -- 8: Firewall and DMZ Design: ISA Server 2000 -- 9: DMZ Router and Switch Security -- 10: DMZ Based VPN Services -- 11: Wireless DMZ Implementation -- 12: Sun Solaris Bastion Hosts -- 13: Windows 2000 Bastion Hosts -- 14: Hacking the DMZ -- 15: Intrusion Detection in the DMZ.

This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. The only book published on Network DMZs on the components of securing enterprise networks This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures.

Added to collection customer.56279.3

Powered by Koha